It/205 Checkpoint Monitoring Employees

How does e-mail benefit an organization? Email can benefit a company because it is faster than the regular mail service, emails can be saved for later use and response can also be saved and retrieved later if needed. Organizations want to limit how employees use email so that they do not open unwanted files or attachments that can cause virus to the system.

I think that instant messaging for employees is a good source. It allows them another contact way in case the phone lines are busy.The drawbacks of using Web page and search engine use in an organization is that search engines bring up unwanted hits and cookies are established on the system. The benefits for a company having a web page are it can draw attention for the business. The disadvantage would be hacker or unwanted material posted on the website.

I believe that they should monitor employee email and internet usage. By allowing the company to monitor such actions it will stop individuals wasting valuable company time. This also allows for restrictions of site access if one is exploring sites they should not be. It is important to watch to be sure that important information about the company is not leaked out to the public. Actions of their employees effect company whether online or not online. Although, the internet makes it easier to incidentally bring hardship to company in which one works the actions can cause lawsuits against the company.

I think that if employees want their own email to be secret then they should have an alternative email in place and only access it from home and not while working or when using the companies computers. I do not think that individuals should be accessing their personal accounts or messaging their friends on company time under any circumstances. If employees access their own information on company time and the company sees this and monitors it then that is the individuals fault. Reference:

You May Also Find These Documents Helpful

...MonitoringEmployees on Networks Checkpoint
IT/205
How does email benefit an organization? Why might an organization limit how an employee uses email during work hours? What is an emails path once it leaves an organization?
Using email within an organization allows for communication on a larger scale reaching multiple employees at ones with important organizational information. Or getting information to one person in an organization and getting the ball rolling on a project or a response in a timely manner. An organization my choose to limit how an employee uses email during work hours because of the amount of work hours lost on personal email as well the risk of legal action being taken against an organization because of personal emails. Once an email leaves an organization its path can be traced back to the organization regardless of its contents being personal or not it is still backed by that organizations name.
What is the effect of instant messaging on organizational networks? What are benefits and drawbacks of using instant messaging in an organization?
Instant messaging on an organizational network saves money and time; it increases productivity because of the interactive communication in real time without the use of phone lines. The drawbacks to instant messaging are a decrease in productivity because employees are chatting on personal issues, network traffic...

...Week 5 checkpoint IT
The credit card data theft at TJX Companies is considered one of the worst ever. The case is significant because of a lack of appropriate security and control.
Resources: Ch. 7 & 12 of Essentials of Management Information Systems
Answer the following questions in 200 to 300 words:
•List and describe the security controls in place. Where are the weaknesses?
The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security...

...CheckPoint: Don't Count on it
IT 205
Joel Balkum
The FDCA project is an evolution into the technology age for the U.S. Census Bureau. Implementing handheld electronic devices improves the effectiveness of the collection process because it cuts down the use of paper for recording data, it replaces hardcopy maps that collectors would carry to find their way around, saves time and money, and makes staying organized easier to do which improves data quality and credibility.
The problems that the Census Bureau faced when implementing the new wireless data collection system started with the Federal government neglecting to hire certified program managers and qualified executives to oversee the project. From there, there was a lack of testing if the system and devices, that Harris Corp. supplied, were effective enough to collect data. Results later in the collection process showed that the devices were too slow in transmitting the data within the system.
The steps that I would have taken if I was in control of the FDCA project would first be to hire centerfield and qualified programmers, executive and employees to oversee and put the project into motion. The next thing I would do is to hire a credible company that can provide a reliable system and handheld devices. Once I have selected the company, I would put the system and devices through a series of test to see the effectiveness and compatibility. When the system and devices...

...﻿Rules for monitoringemployees in professional and ethical manners
Privacy in the workplace is one of the most professional concerns in today’s society. Due to the escalation in cyberloafing and lawsuits in workplaces, employee monitoring has become more prevalent. Nevertheless privacy issues cannot be effectively addressed; deprived of considering the ethics and ethical manners. Employee monitoring has risen up concerns to our society and workplaces such as – business & accounting organizations, lawyers, hospitals, professional ethicists, and many more professional industries. To reach to a significant conclusion about privacy rights in a workplace, we have to consider about rules and regulations, ethics in the workplace without invading anyone’s privacy or rights and employees’ must have their own responsibilities and have a common understanding of the ethical basis of justice and a thorough understanding of individual and organizational concerns and motivations.
(Mujtaba, B. G. 2003) stated that employee monitoring is an act of watching and checking employees' actions during the working hours using employer’s equipment. Since employee monitoring has occurred as a necessity, it causes concerns to both employers and employees with the ethical implications of constant monitoring. Employers use monitoring devices to keep...

...IT 205 Week 4 Check Point: MonitoringEmployees on Networks
Employers want to limit an employee’s use of e mails or internet usage during work hours for the following reasons; employee productivity, and network safety. If an employee is using e mail or the internet for his or her own personal use rather than business use, it is costing the company the loss of potential revenue. The amount of traffic on a company's network could risk the network's safety and also cause the server to become clogged with personal business rather than business use. If the network safety of secure business information becomes compromised it may cost the business money in lawsuits and bad publicity.
E-mails benefit an organization by the company being able to communicate faster with their customers, and may be an important source of evidence for defending the business should a lawsuit arise.
The benefits of Instant messaging (IM) in an organization is to minimize e mail traffic, and allow the employees to talk in real time without leaving his or her department. Instant messaging on an organization's network, whether it is personal or business, is subject to surveillance and the organization is held accountable. The drawbacks of Instant messaging (IM) are; unsecured channels within the organization are open and subject to viruses, spyware, worms, and spam, all of which will result to loss of productivity and resources. It is also a...

...﻿Cosc 3215
The Impact of Monitoring Employment
I wanted to discuss the technology used to monitor employees. Whether it be at the computer/workstation or on the cameras set around the workplace. More and more companies and corporations are implementing monitoring software such as Spector, Sonar, Spytech, and iSafe. All used in order to keep track of employees on what they are looking at, what they are working on, and how much time they do it. You start to wonder when it becomes too much. Or when does it wonder into invasion of privacy? Granted that while on the clock you are on your employers time and you are expected to perform what you where hired for. In this day and age there is always up and down time. And a ten minute break in between work may bring you to checking a status or looking up a curiosity that passed in your mind, or checking some new that has been floating around the office. But this sometimes is all it takes to lose your job.
Powerful reasons exist to monitor employee online behavior at work. These reasons are compelling for many employers and understandable and have experienced it myself. In my own experience with electronic surveillance of employees, I watch employees with monitoring software, and they had been watching pornographic movies at work, stealing and breaking items, or simply missing scanning certain items. At my old job you had to clock...

...together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW).
 E-mail
 File-sharing
 Instant messaging
 Internet fax
 World Wide Web
 Voice over IP
 Mobile VoIP
Intranet An intranet is a private network that uses Internet and WWW
technology. An intranet is kept private through the use of a
firewall.
Intranet is generally restricted to employees of the organization. There does not necessarily have to be any access from the organization's internal network to the Internet itself. Intranet traffic, like public-facing web site traffic, is better understood by using web metrics software to track overall activity, as well as through surveys of users. Companies have adopted intranets to streamline
their operations and to facilitate greater communication
among employees. Intranets are also being used as culture change platforms where large numbers of employees discussing key issues in an online forum leads to new ideas. Intranets are being used to deliver tools and applications, e.g., collaboration (to facilitate working in groups and teleconferencing) or sophisticated corporate directories, sales and CRM tools, project management etc., to advance productivity.
Extranet An extranet is a Web site that allows an organization's customers
and business partners limited access to an...